{"id":9744,"date":"2015-07-21T13:00:40","date_gmt":"2015-07-21T20:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9744"},"modified":"2015-07-20T14:00:03","modified_gmt":"2015-07-20T21:00:03","slug":"all-recent-unit-42-threat-intelligence-right-at-the-top-of-your-inbox","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/07\/all-recent-unit-42-threat-intelligence-right-at-the-top-of-your-inbox\/","title":{"rendered":"All Recent Unit 42 Threat Intelligence - Right at the Top of Your Inbox"},"content":{"rendered":"<p>Unit 42, the Palo Alto Networks threat intelligence team, shares regular research insights, including blog posts, whitepapers, videos and podcasts. Get notified every time new Unit 42 content is available by subscribing to Unit 42 alerts in the \"Get Updates\" box <a href=\"https:\/\/www.paloaltonetworks.com\/content\/paloaltonetworks-com\/global\/en_US\/index\/threat-research.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:13.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7596 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png\" alt=\"blog-title-unit42\" width=\"500\" height=\"68\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-500x68.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-230x31.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-510x69.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42-240x32.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/blog-title-unit42.png 632w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<h3>Catch up on recent release<\/h3>\n<p><!--more--><\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/tracking-minidionis-cozycars-new-ride-is-related-to-seaduke\/\" target=\"_blank\">Tracking MiniDionis: CozyCar\u2019s New Ride Is Related to Seaduke<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/unit-42-technical-analysis-seaduke\/\" target=\"_blank\">Unit 42 Technical Analysis: Seaduke<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit\/\" target=\"_blank\">APT Group UPS Targets US Government with Hacking Team Flash Exploit<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/07\/new-android-malware-family-evades-antivirus-detection-by-using-popular-ad-libraries\/\" target=\"_blank\">New Android Malware Family Evades Antivirus Detection by Using Popular Ad Libraries<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/06\/episode-4-of-dont-panic-cyber-attack-attribution\/\">Episode 4 of Don\u2019t Panic: Cyber Attack Attribution<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unit 42, the Palo Alto Networks threat intelligence team, shares regular research insights, including blog posts, whitepapers, videos and podcasts. Get notified every time new Unit 42 content is available by subscribing &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1208,1105,1276,1291,1296,586],"coauthors":[716],"class_list":["post-9744","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-adobe-flash","tag-dont-panic","tag-gunpoder","tag-hacking-team","tag-seaduke","tag-unit-42"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9744"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9744\/revisions"}],"predecessor-version":[{"id":9782,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9744\/revisions\/9782"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9744"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}